‘‘Its not a bug ,its a feature’’

Topic Learnings
Networking
Introduction Network OSI Mode, Network Devices, TCP Model, Cables, IPV4 addressing, Subnetting, Network Design, IPV6, IPV6 Neighbor Discovery Protocol, IPV6 Subnetting, TCP & UDP, Verifying IP Parameters, Describing Wireless Principles, Virtualization Fundamentals, Switching Concepts
Network Access Configuring & Verifying VLAN, Configuring and Verifying Interswitch connectivity, configure and verify Cisco Delivery Protocol & LLDP, Configuring LACP, Basic Operations of RAPID PVST+, Spanning Tree Protocol & basic operations, Wireless Architecture, WLAN Components (AP WLC, access/Trunk ports & LAG), Configuring Wireless LAN, AP & WLC management access connections, PPP, MLPP, PPoE
IP Connectivity Routing Table, Components of Routing Table, How Router makes a forwarding decision, Configure and Verify IPV4 and IPV6 static routing, configure and verify single area OSPF V2, First Hop redundancy protocol
IP Services Configure inside source NAT using static and pools, configure NTP operating in a client server mode, DHCP, DNS, SNMP, use of syslog, Configure DHCP client and relay, PHB for QoS classification / marking / queuing / congestion / policy / shaping, remote access for network devices, TFTP/FTP functionality,
Security Security Concepts, security Program elements, password policy/management/complexity/alternatives, remote access, site to site vpn, ACL, DHCP Snooping, ARP inspection, Port Security, authentication vs authorization vs accounting concepts, WPA, WPA2,WPA3, configuring WLAN using WPA2 PSK
Automation Impact of automation on network management, traditional network vs controller-based networking, controller-based vs software based (overlay, underlay and fabric), REST based API, SDN, JSON, Configuration management using CHEF, PUPPET and ANSIBLE
Cyber Security
Introduction Introduction to Cyber Security,
Fundamentals Fundamentals of Cyber Security, Security/Threat/Vulnerability/Adversaries, Security Modeling & Risk Assessment, Confidentiality, Integrity and Availability, Zero Trust Model, Security Bugs & Vulnerabilities, Hackers/Crackers/Cyber Criminals, Malware/Viruses/rootkings/RAT, Phishing/Vishing/SMShing, spamming and doxing Crypto Mining Malware and Crypto Jackers, Security Policy, Security Mitigation Methods
Encryption Introduction, Symmetric/Asymmetric, hash Functions, Digital Signatures, SSL/TLS, SSL Stripping, HTTPS, Digital Certificates, End to End Encryption
Architecture Secure Architecture, Wireless Networks, Network Security controls, Security Testing, Cloud
Governance Security Governance, Risk Management
Incident Management Incident and Response Management, Digital Forensics, BCP and DR

Networking & Cyber Security